QUESTION 60You need to recommend a solution that manages the security events. The solution must meet the technical requirements.Which configuration should you include in the recommendation?

A. Object access auditing by using a Group Policy object (GPO)B. Event rules by using System Center 2012 Operations ManagerC. Event forwarding by using Event ViewerD. Audit Collection Services (ACS) by using System Center 2012

QUESTION 62Your network contains an Active Directory domain named contoso.com. The network contains 15,000 client computers. You plan to deploy an Active Directory Certificate Services (AD CS) infrastructure and issue certificates to all of the network devices. You need to recommend a solution to minimize the amount of network utilization caused by certificate revocation list (CRL) checking.What should you include in the recommendation? More than one answer choice may achieve the goal. Select the BEST answer.

A. The Network Device Enrollment Service role serviceB. An increase of the CRL validity periodC. A reduction of the CRL validity periodD. The Online Responder role service

QUESTION 63Your network contains an Active Directory domain named contoso.com. You deploy Active Directory Certificate Services (AD CS). You plan to deploy 100 external Web servers that will be publicly accessible and will require Secure Sockets Layer (SSL) certificates. You also plan to deploy 50,000 certificates for secure email exchanges with Internet-based recipients. You need to recommend a certificate services solution for the planned deployment. What should you recommend? More than one answer choice may achieve the goal. Select the BEST answer.

QUESTION 64Your company, which is named Contoso, Ltd., has offices only in North America. The company has 2,000 users. The network contains an Active Directory domain named contoso.com. You plan to deploy an Active Directory Certificate Services (AD CS) infrastructure and assign certificates to all client computers. You need to recommend a PKI solution to protect the private key of the root certification authority (CA) from being accessed by external users. What should you recommend? More than one answer choice may achieve the goal. Select the BEST answer.